2017-12-21 - NECURS BOTNET MALSPAM PUSHES GLOBEIMPOSTER RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

IMAGES


Shown above:  Email example from today's Necurs Botnet malspam.

 

 


Shown above:  One of the attached 7-zip archives and extracted JavaScript (JS) file.

 


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Examples of encrypted files on an infected Windows host.

 


Shown above:  Decryption instructions from the HTML file dropped on the infected Windows host.

 


Shown above:  Decryptor showed ransom payment as 0.065 Bitcoin in the morning.  It changed slightly when I tried again in the afternoon.

 


Shown above:  Artifact found in the user's AppData\Local\Temp directory.

 

INDICATORS

EMAIL DATA FROM 10 EXAMPLES:

 

SHA256 HASHES FOR THE ATTACHMENTS

 

SHA256 HASHES FOR THE EXTRACTED JS FILES:

 

PARTIAL URLS FROM THE JAVASCRIPT FILES TO RETRIEVE GLOBEIMPOSTER RANSOMWARE:

 

TRAFFIC FROM AN INFECTED WINDOWS HOST:

 

GLOBEIMPOSTER RANSOMWARE EXECUTABLES:

 

OTHER INFORMATION:

 

Click here to return to the main page.